 Vitess security auditmodel of Vitessʼs VTAdmin component. We first outline the core components of VTAdmin. We then cover how it interacts with the internal components of Vitess. Next, we specify the threat actors that could have we exemplify several threat scenarios based on the observations we made when outlining the core components and the specified threat actors. We used the following sources for the threat modelling: ● Vitessʼs disclosures to the Vitess security team are opportunities to evaluate the threat model of the affected components. Most compromises of VTAdmin have the goal of compromising the full Vitess deployment. As such0 码力 | 41 页 | 1.10 MB | 1 年前3 Vitess security auditmodel of Vitessʼs VTAdmin component. We first outline the core components of VTAdmin. We then cover how it interacts with the internal components of Vitess. Next, we specify the threat actors that could have we exemplify several threat scenarios based on the observations we made when outlining the core components and the specified threat actors. We used the following sources for the threat modelling: ● Vitessʼs disclosures to the Vitess security team are opportunities to evaluate the threat model of the affected components. Most compromises of VTAdmin have the goal of compromising the full Vitess deployment. As such0 码力 | 41 页 | 1.10 MB | 1 年前3
 The Vitess 11.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Understanding the Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 481 页 | 3.14 MB | 1 年前3 The Vitess 11.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Understanding the Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 481 页 | 3.14 MB | 1 年前3
 The Vitess 10.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Understanding the Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 455 页 | 3.07 MB | 1 年前3 The Vitess 10.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Understanding the Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 455 页 | 3.07 MB | 1 年前3
 The Vitess 9.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Understanding the Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 417 页 | 2.96 MB | 1 年前3 The Vitess 9.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Understanding the Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 417 页 | 2.96 MB | 1 年前3
 The Vitess 8.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . configuration concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Configuring Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 331 页 | 1.35 MB | 1 年前3 The Vitess 8.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . configuration concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Configuring Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 331 页 | 1.35 MB | 1 年前3
 The Vitess 12.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Understanding the Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 534 页 | 3.32 MB | 1 年前3 The Vitess 12.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Understanding the Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 534 页 | 3.32 MB | 1 年前3
 The Vitess 7.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Configuring Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 254 页 | 949.63 KB | 1 年前3 The Vitess 7.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Configuring Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Ensure all components are up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream0 码力 | 254 页 | 949.63 KB | 1 年前3
 The Vitess 5.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Configuring Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . following additional packages: sudo yum install -y ant maven zip gcc You can then install additional components from make tools. If your machine requires a proxy to access the Internet, you will need to set also need to install ant and maven: 16 brew install ant maven You can then install additional components from make tools. If your machine requires a proxy to access the Internet, you will need to set0 码力 | 206 页 | 875.06 KB | 1 年前3 The Vitess 5.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Configuring Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . following additional packages: sudo yum install -y ant maven zip gcc You can then install additional components from make tools. If your machine requires a proxy to access the Internet, you will need to set also need to install ant and maven: 16 brew install ant maven You can then install additional components from make tools. If your machine requires a proxy to access the Internet, you will need to set0 码力 | 206 页 | 875.06 KB | 1 年前3
 The Vitess 6.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Configuring Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream following additional packages: sudo yum install -y ant maven zip gcc You can then install additional components from make tools. If your machine requires a proxy to access the Internet, you will need to set0 码力 | 210 页 | 846.79 KB | 1 年前3 The Vitess 6.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Configuring Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . binary logs from the underlying MySQL shards of the Vitess cluster. gRPC clients, including Vitess components like VTTablets, can subscribe to a VStream to receive change events from other shards. The VStream following additional packages: sudo yum install -y ant maven zip gcc You can then install additional components from make tools. If your machine requires a proxy to access the Internet, you will need to set0 码力 | 210 页 | 846.79 KB | 1 年前3
 Pentest-Report Vitess 02.2019gain better understanding of the general deployment structure and the integration with the core components. • The initially enumerated application endpoints were tested for potential input manipulation Nothing prone to being leveraged could be identified. • The runtime behavior of the different components was probed from a perspective of the services. In focus were Denial-of-Service and similar resource-depletion easy for the auditors to review the software’s structure. Except for the SQL parser, none of the components had overly complex logic or included typically vulnerable constructs. The above factors0 码力 | 9 页 | 155.02 KB | 1 年前3 Pentest-Report Vitess 02.2019gain better understanding of the general deployment structure and the integration with the core components. • The initially enumerated application endpoints were tested for potential input manipulation Nothing prone to being leveraged could be identified. • The runtime behavior of the different components was probed from a perspective of the services. In focus were Denial-of-Service and similar resource-depletion easy for the auditors to review the software’s structure. Except for the SQL parser, none of the components had overly complex logic or included typically vulnerable constructs. The above factors0 码力 | 9 页 | 155.02 KB | 1 年前3
共 10 条
- 1













